var btoa; Cu.import("resource://services-sync/base_records/crypto.js"); Cu.import("resource://services-sync/constants.js"); btoa = Cu.import("resource://services-sync/util.js").btoa; function test_time_keyFromString(iterations) { let k; let o; let b = new BulkKeyBundle(); let d = Utils.decodeKeyBase32("ababcdefabcdefabcdefabcdef"); b.generateRandom(); _("Running " + iterations + " iterations of hmacKeyObject + sha256HMACBytes."); for (let i = 0; i < iterations; ++i) { let k = b.hmacKeyObject; o = Utils.sha256HMACBytes(d, k); } do_check_true(!!o); _("Done."); } function test_repeated_hmac() { let testKey = "ababcdefabcdefabcdefabcdef"; let k = Utils.makeHMACKey("foo"); let one = Utils.sha256HMACBytes(Utils.decodeKeyBase32(testKey), k); let two = Utils.sha256HMACBytes(Utils.decodeKeyBase32(testKey), k); do_check_eq(one, two); } function do_check_array_eq(a1, a2) { do_check_eq(a1.length, a2.length); for (let i = 0; i < a1.length; ++i) { do_check_eq(a1[i], a2[i]); } } function test_keymanager() { let testKey = "ababcdefabcdefabcdefabcdef"; let username = "john@example.com"; // Decode the key here to mirror what generateEntry will do, // but pass it encoded into the KeyBundle call below. let sha256inputE = "" + HMAC_INPUT + username + "\x01"; let key = Utils.makeHMACKey(Utils.decodeKeyBase32(testKey)); let encryptKey = Utils.sha256HMACBytes(sha256inputE, key); let sha256inputH = encryptKey + HMAC_INPUT + username + "\x02"; let hmacKey = Utils.sha256HMACBytes(sha256inputH, key); // Encryption key is stored in base64 for WeaveCrypto convenience. do_check_eq(btoa(encryptKey), new SyncKeyBundle(null, username, testKey).encryptionKey); do_check_eq(hmacKey, new SyncKeyBundle(null, username, testKey).hmacKey); // Test with the same KeyBundle for both. let obj = new SyncKeyBundle(null, username, testKey); do_check_eq(hmacKey, obj.hmacKey); do_check_eq(btoa(encryptKey), obj.encryptionKey); } function do_check_keypair_eq(a, b) { do_check_eq(2, a.length); do_check_eq(2, b.length); do_check_eq(a[0], b[0]); do_check_eq(a[1], b[1]); } function test_collections_manager() { let log = Log4Moz.repository.getLogger("Test"); Log4Moz.repository.rootLogger.addAppender(new Log4Moz.DumpAppender()); let keyBundle = ID.set("WeaveCryptoID", new SyncKeyBundle(PWDMGR_PASSPHRASE_REALM, "john@example.com", "a-bbbbb-ccccc-ddddd-eeeee-fffff")); /* * Build a test version of storage/crypto/keys. * Encrypt it with the sync key. * Pass it into the CollectionKeyManager. */ log.info("Building storage keys..."); let storage_keys = new CryptoWrapper("crypto", "keys"); let default_key64 = Svc.Crypto.generateRandomKey(); let default_hmac64 = Svc.Crypto.generateRandomKey(); let bookmarks_key64 = Svc.Crypto.generateRandomKey(); let bookmarks_hmac64 = Svc.Crypto.generateRandomKey(); storage_keys.cleartext = { "default": [default_key64, default_hmac64], "collections": {"bookmarks": [bookmarks_key64, bookmarks_hmac64]}, }; storage_keys.modified = Date.now()/1000; storage_keys.id = "keys"; log.info("Encrypting storage keys..."); // Use passphrase (sync key) itself to encrypt the key bundle. storage_keys.encrypt(keyBundle); // Sanity checking. do_check_true(null == storage_keys.cleartext); do_check_true(null != storage_keys.ciphertext); log.info("Updating CollectionKeys."); // updateContents decrypts the object, releasing the payload for us to use. // Returns true, because the default key has changed. do_check_true(CollectionKeys.updateContents(keyBundle, storage_keys)); let payload = storage_keys.cleartext; _("CK: " + JSON.stringify(CollectionKeys._collections)); // Test that the CollectionKeyManager returns a similar WBO. let wbo = CollectionKeys.asWBO("crypto", "keys"); _("WBO: " + JSON.stringify(wbo)); _("WBO cleartext: " + JSON.stringify(wbo.cleartext)); // Check the individual contents. do_check_eq(wbo.collection, "crypto"); do_check_eq(wbo.id, "keys"); do_check_eq(storage_keys.modified, wbo.modified); do_check_true(!!wbo.cleartext.default); do_check_keypair_eq(payload.default, wbo.cleartext.default); do_check_keypair_eq(payload.collections.bookmarks, wbo.cleartext.collections.bookmarks); do_check_true('bookmarks' in CollectionKeys._collections); do_check_false('tabs' in CollectionKeys._collections); _("Updating contents twice with the same data doesn't proceed."); storage_keys.encrypt(keyBundle); do_check_false(CollectionKeys.updateContents(keyBundle, storage_keys)); /* * Test that we get the right keys out when we ask for * a collection's tokens. */ let b1 = new BulkKeyBundle(null, "bookmarks"); b1.keyPair = [bookmarks_key64, bookmarks_hmac64]; let b2 = CollectionKeys.keyForCollection("bookmarks"); do_check_keypair_eq(b1.keyPair, b2.keyPair); // Check key equality. do_check_true(b1.equals(b2)); do_check_true(b2.equals(b1)); b1 = new BulkKeyBundle(null, "[default]"); b1.keyPair = [default_key64, default_hmac64]; do_check_false(b1.equals(b2)); do_check_false(b2.equals(b1)); b2 = CollectionKeys.keyForCollection(null); do_check_keypair_eq(b1.keyPair, b2.keyPair); /* * Checking for update times. */ let info_collections = {}; do_check_true(CollectionKeys.updateNeeded(info_collections)); info_collections["crypto"] = 5000; do_check_false(CollectionKeys.updateNeeded(info_collections)); info_collections["crypto"] = 1 + (Date.now()/1000); // Add one in case computers are fast! do_check_true(CollectionKeys.updateNeeded(info_collections)); CollectionKeys._lastModified = null; do_check_true(CollectionKeys.updateNeeded({})); /* * Check _compareKeyBundleCollections. */ function newBundle(name) { let r = new BulkKeyBundle(null, name); r.generateRandom(); return r; } let k1 = newBundle("k1"); let k2 = newBundle("k2"); let k3 = newBundle("k3"); let k4 = newBundle("k4"); let k5 = newBundle("k5"); let coll1 = {"foo": k1, "bar": k2}; let coll2 = {"foo": k1, "bar": k2}; let coll3 = {"foo": k1, "bar": k3}; let coll4 = {"foo": k4}; let coll5 = {"baz": k5, "bar": k2}; let coll6 = {}; let d1 = CollectionKeys._compareKeyBundleCollections(coll1, coll2); // [] let d2 = CollectionKeys._compareKeyBundleCollections(coll1, coll3); // ["bar"] let d3 = CollectionKeys._compareKeyBundleCollections(coll3, coll2); // ["bar"] let d4 = CollectionKeys._compareKeyBundleCollections(coll1, coll4); // ["bar", "foo"] let d5 = CollectionKeys._compareKeyBundleCollections(coll5, coll2); // ["baz", "foo"] let d6 = CollectionKeys._compareKeyBundleCollections(coll6, coll1); // ["bar", "foo"] let d7 = CollectionKeys._compareKeyBundleCollections(coll5, coll5); // [] let d8 = CollectionKeys._compareKeyBundleCollections(coll6, coll6); // [] do_check_true(d1.same); do_check_false(d2.same); do_check_false(d3.same); do_check_false(d4.same); do_check_false(d5.same); do_check_false(d6.same); do_check_true(d7.same); do_check_true(d8.same); do_check_array_eq(d1.changed, []); do_check_array_eq(d2.changed, ["bar"]); do_check_array_eq(d3.changed, ["bar"]); do_check_array_eq(d4.changed, ["bar", "foo"]); do_check_array_eq(d5.changed, ["baz", "foo"]); do_check_array_eq(d6.changed, ["bar", "foo"]); } // Make sure that KeyBundles work when persisted through Identity. function test_key_persistence() { _("Testing key persistence."); // Create our sync key bundle and persist it. let k = new SyncKeyBundle(null, null, "abcdeabcdeabcdeabcdeabcdea"); k.username = "john@example.com"; ID.set("WeaveCryptoID", k); let id = ID.get("WeaveCryptoID"); do_check_eq(k, id); id.persist(); // Now erase any memory of it. ID.del("WeaveCryptoID"); k = id = null; // Now recreate via the persisted value. id = new SyncKeyBundle(); id.username = "john@example.com"; // The password should have been fetched from storage... do_check_eq(id.password, "abcdeabcdeabcdeabcdeabcdea"); // ... and we should be able to grab these by derivation. do_check_true(!!id.hmacKeyObject); do_check_true(!!id.hmacKey); do_check_true(!!id.encryptionKey); } function run_test() { test_keymanager(); test_collections_manager(); test_key_persistence(); test_repeated_hmac(); // Only do 1,000 to avoid a 5-second pause in test runs. test_time_keyFromString(1000); }